Skip to content

Instantly share code, notes, and snippets.

wuseman wuseman

Block or report user

Report or block wuseman

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View vimrc
" File : .vimrc
" Author : wuseman <wuseman@nr1.nu>
" Date : 23.04.2019
" Last Modified Date: 23.04.2019
" Last Modified By : wuseman <wuseman@nr1.nu>
" Use Vim settings, rather than Vi settings (much better!).
" This must be first, because it changes other options as a side effect.
set nocompatible
@wuseman
wuseman / wuseman-dark-purple-sublime-theme.tmTheme
Created Jan 13, 2020
wuseman-dark-purple-sublime-theme.tmTheme
View wuseman-dark-purple-sublime-theme.tmTheme
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<!-- Generated by: TmTheme-Editor -->
<!-- ============================================ -->
<!-- app: http://tmtheme-editor.herokuapp.com -->
<!-- code: https://github.com/aziz/tmTheme-Editor -->
<plist version="1.0">
<dict>
<key>name</key>
<string>wuseman</string>
@wuseman
wuseman / uusd.p8lite.txt
Created Dec 3, 2019
HUAWEI_P8LiTE_UUSD_CODES
View uusd.p8lite.txt
#!/bin/bash
cat << "EOF"
--------------------------------------------------------------------------------------------------------------------------------
# UUSD CODES
--------------------------------------------------------------------------------------------------------------------------------
*#06# ## Displays IMEI number
*#*#225#*#* ## Calendar Info
*#*#426#*#* ## Google Play Services
*#*#1357946#*#* ## EMUI version, Serial Number and Product ID
*#*#2846579#*#* ## Background Settings, Veneer information, Network Information Query, Software Upgrade, Restore Factory, Battery Charge
View plex-over-wan.md

You must tunnel the traffic first time for find your server, you wont need to tunnel it more then really first time when you want to discover the server.

  ssh -L 32400:localhost:32400 youruser@yourserver.com

Once tunnel is established go setup your browser to use localhost:32400 in network settings, now just browse to: https://localhost:32400/web

You will now be able to browse your server from anywhere, anytime. Just visit: http://plex.tv/web/index.html#

The only port that is required to be open in itpables is port 32400 of course.

View BOSE-HACKING.sh
Telnet to the hidden port 170001 and use the commands below for play and have fun with your bose device.
Credit's to the guy who uploaded all these on pastebin.
->help
? : ? [List available commands( same as help )]
abl
baud : abl baud <baudrate> [Sets baudrate]
key : abl key <key code> [Send the corresponding key]
mute : abl mute [int|user] [Sets the internal or user mute]
View BANNER
___ __________ _________
| W | | | | | ___
_|___|_ | Author | | wuseman | |___|
(_xx) |__________, |_________| (xx_)=====
__)#(__ | | __)#(__
( )...( )(|) (|)( )...( )
|| |_| ||// \\|| |_| ||
(<=() | | ()/ \() | | ()=>)
_(___)_ _(___)__
[-] [-] [x] [x]
@wuseman
wuseman / vmware-fix-gentoo.sh
Last active Oct 24, 2019
vmware-fix-gentoo.sh
View vmware-fix-gentoo.sh
#!/bin/bash
VMWARE_VERSION=workstation-12.5.9
TMP_FOLDER=/tmp/patch-vmware
rm -fdr $TMP_FOLDER
mkdir -p $TMP_FOLDER
cd $TMP_FOLDER
git clone https://github.com/mkubecek/vmware-host-modules.git
cd $TMP_FOLDER/vmware-host-modules
git checkout $VMWARE_VERSION
@wuseman
wuseman / wbadips.sh
Created Jun 15, 2019
Script for add ip addresses from badips.com
View wbadips.sh
#!/bin/bash
# Author: wuseman <wuseman@nr1.nu>
# Simple script for add ip addresses from badips.com
# Recommended: Add this to cron to run once a day, it wont add same ip twice..
# Another script i fixed for fun for a stranger on facebook :-)
BANNEDIPS="/root/ip-addresses.txt"
if [[ ! -f "$BANNEDIPS" ]]; then
printf "Creating $BANNEDIPS...\n"
@wuseman
wuseman / wssh-monitor.sh
Created Jun 15, 2019
Script for see brute force attempts in realtime
View wssh-monitor.sh
#!/bin/bash
# Author: wuseman <wuseman@nr1.nu>
# Simple script for monitor ssh brute attempts, fixed this for some stranger on fcebook for fun.
# Output: [2011-01-01 - 19:01:10] Someone have tried to login from <xx.xx.xx.xx> user=username
while true; do
inotifywait -r -q --format %w /var/log/auth.log|grep -i "Failed password for"|tail -n 1|grep -oE '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b'
echo -e "[$(date +%Y-%m-%d\ -\ %H:%M:%S)] - Someone tried to login from \e[1;31m$(cat /var/log/auth.log|grep "authentication failure; l"|awk -Frhost= '{print $2}'|tail -n 1 )\e[0m"
# adda din iptabls oneliner här
# # /sbin/iptables -I INPUT -i eth1 -s $VARIABEL -j DROP
View install-weechat.sh
#!/bin/bash
sudo sh -c 'echo "deb https://weechat.org/ubuntu $(lsb_release -cs) main" >> /etc/apt/sources.list.d/weechat.list'
sudo apt-key adv --keyserver keys.gnupg.net --recv-keys 11E9DE8848F2B65222AA75B8D1820DB22A11534E
sudo apt-get update
sudo apt-get install weechat
You can’t perform that action at this time.